Pass 312-50v9 exam with the latest Lead2pass 312-50v9 dumps: Lead2pass 312-50v9 exam questions and answers in PDF are prepared by our experts. Moreover, they are based on the recommended syllabus that covering all the 312-50v9 exam objectives.

A. LM hashes consist in 48 hexadecimal characters.B. LM hashes are based on AES128 cryptographic standard.C. Uppercase characters in the password are converted to lowercase.D. LM hashes are not generated when the password length exceeds 15 characters.

Answer: D

QUESTION 102A developer for a company is tasked with creating a program that will allow customers to update their billing and shipping information. The billing address field used is limited to 50 characters. What pseudo code would the developer use to avoid a buffer overflow attack on the billing address field?

QUESTION 103A security analyst in an insurance company is assigned to test a new web application that will be used by clients to help them choose and apply for an insurance plan. The analyst discovers that the application is developed in ASP scripting language and it uses MSSQL as a database backend. The analyst locates the application’s search form and introduces the following code in the search input field:

QUESTION 108Which of the following parameters enables NMAP’s operating system detection feature?

A. NMAP -sVB. NMAP -oSC. NMAP -sRD. NMAP -O

Answer: D

QUESTION 109Which of the following open source tools would be the best choice to scan a network for potential targets?

A. NMAPB. NIKTOC. CAIND. John the Ripper

Answer: A

QUESTION 110A hacker is attempting to see which IP addresses are currently active on a network. Which NMAP switch would the hacker use?

A. -sOB. -sPC. -sSD. -sU

Answer: B

QUESTION 111A hacker, who posed as a heating and air conditioning specialist, was able to install a sniffer program in a switched environment network. Which attack could the hacker use to sniff all of the packets in the network?

A. FraggleB. MAC FloodC. SmurfD. Tear Drop

Answer: B

QUESTION 112Which of the following settings enables Nessus to detect when it is sending too many packets and the network pipe is approaching capacity?

QUESTION 113How does an operating system protect the passwords used for account logins?

A. The operating system performs a one-way hash of the passwords.B. The operating system stores the passwords in a secret file that users cannot find.C. The operating system encrypts the passwords, and decrypts them when needed.D. The operating system stores all passwords in a protected segment of non-volatile memory.

Answer: A

QUESTION 114Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?

A. Cavity virusB. Polymorphic virusC. Tunneling virusD. Stealth virus

Answer: D

QUESTION 115An attacker has been successfully modifying the purchase price of items purchased on the company’s web site. The security administrators verify the web server and Oracle database have not been compromised directly. They have also verified the Intrusion Detection System (IDS) logs and found no attacks that could have caused this. What is the mostly likely way the attacker has been able to modify the purchase price?

A. By using SQL injectionB. By changing hidden form valuesC. By using cross site scriptingD. By utilizing a buffer overflow attack

Answer: B

QUESTION 116Which tool can be used to silently copy files from USB devices?

A. USB GrabberB. USB DumperC. USB SnifferD. USB Snoopy

Answer: B

QUESTION 117Which of the following is used to indicate a single-line comment in structured query language (SQL)?

A. —B. ||C. %%D. ”

Answer: A

QUESTION 118A security engineer is attempting to map a company’s internal network. The engineer enters in the following NMAP command:

NMAP -n -sS -P0 -p 80 ***.***.**.**

What type of scan is this?

A. Quick scanB. Intense scanC. Stealth scanD. Comprehensive scan

Answer: CExplanation:

QUESTION 119What is the broadcast address for the subnet 190.86.168.0/22?

A. 190.86.168.255B. 190.86.255.255C. 190.86.171.255D. 190.86.169.255

Answer: C

QUESTION 120A company is using Windows Server 2003 for its Active Directory (AD). What is the most efficient way to crack the passwords for the AD users?

Comparing with others’, you will find our 312-50v9 exam questions are more helpful and precise since all the 312-50v9 exam content is regularly updated and has been checked for accuracy by our team of EC-Council expert professionals.